Search results for: unseen class discovery
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2854

Search results for: unseen class discovery

2794 Race, Class, Gender, and the American Welfare State (1930s-1990s)

Authors: Tahar Djebbar Aziza

Abstract:

The American society, like all societies, is fractured by social divisions between different groups of people. It is divided by race, class, gender, and other social and cultural characteristics. Social divisions affect the way and the manner welfare is delivered for citizens within the American society. The welfare state exists to guarantee the promotion of well –being for all the different components within a society without taking into account their age, gender, their ethnicity/race, or their social belonging (class). Race, class, and even gender issues are the main factors that affected the formal structure, the nature, as well as the evolution of the American welfare state and led to its uniqueness. They have affected the structure and the evolution of the American welfare state since its creation in the 1930s, and led to its uniqueness in an international level. This study aims therefore at enhancing the readers’ awareness of social divisions: race, class, gender and their implications for the distribution of welfare resources and life chances in the USA from the early 1930s to the late 1990s.

Keywords: African Americans, class, gender, minority groups, race, social divisions, social policy, U.S. welfare state

Procedia PDF Downloads 530
2793 Modeling Optimal Lipophilicity and Drug Performance in Ligand-Receptor Interactions: A Machine Learning Approach to Drug Discovery

Authors: Jay Ananth

Abstract:

The drug discovery process currently requires numerous years of clinical testing as well as money just for a single drug to earn FDA approval. For drugs that even make it this far in the process, there is a very slim chance of receiving FDA approval, resulting in detrimental hurdles to drug accessibility. To minimize these inefficiencies, numerous studies have implemented computational methods, although few computational investigations have focused on a crucial feature of drugs: lipophilicity. Lipophilicity is a physical attribute of a compound that measures its solubility in lipids and is a determinant of drug efficacy. This project leverages Artificial Intelligence to predict the impact of a drug’s lipophilicity on its performance by accounting for factors such as binding affinity and toxicity. The model predicted lipophilicity and binding affinity in the validation set with very high R² scores of 0.921 and 0.788, respectively, while also being applicable to a variety of target receptors. The results expressed a strong positive correlation between lipophilicity and both binding affinity and toxicity. The model helps in both drug development and discovery, providing every pharmaceutical company with recommended lipophilicity levels for drug candidates as well as a rapid assessment of early-stage drugs prior to any testing, eliminating significant amounts of time and resources currently restricting drug accessibility.

Keywords: drug discovery, lipophilicity, ligand-receptor interactions, machine learning, drug development

Procedia PDF Downloads 80
2792 Crime and Class: A Study on Violent Crime in Dhaka City

Authors: A. B. M. Najmus Sakib

Abstract:

Being one of the most densely populated cities in the world, Dhaka is facing diversified types of crimes every day. Limitations of resources insert serious strains among the inhabitants of this city. This paper aims to analyze the correlation between crime and class, more especially the violent crime in connection with social class. Following the stratified random sampling technique, one of the police divisions among eight of the Dhaka Metropolitan Police (DMP) will be selected. The data will be collected by evaluating the case files found in the police report. First, this paper discusses the nature and pattern of violent crimes in Dhaka city. Then, it assesses the socio-economic status of the accused persons considering their professions. Furthermore, by testing hypothesis, it will identify how the social classes are connected with violent crimes. Finally, the paper will ascertain the particular class that has an impact on violent crime in Dhaka City and will be ended by suggesting possible measures should take by the law enforcement agencies of Bangladesh.

Keywords: social class, violent crime, crime prevention, nature of crime

Procedia PDF Downloads 121
2791 Processes of Identities Formation and Transformation among Professional Skilled Mexican Migrants in the United States

Authors: M. Laura Vazquez Maggio, Lilia Dominguez Villalobos, Jan Luka Frey

Abstract:

This paper contributes to the understanding of the dynamic and the relational nature of identities formation among skilled middle-class migrants. Following the idea that identities are never singular, multifaceted and have a necessarily processual character, the authors specifically analyze three dimensions of the identity of qualified Mexican migrants in the US and the interplay between them. Drawing on semi-structured interviews with skilled Mexican middle-class migrants in the US, the paper explores how skilled Mexican migrants preserve their ethno-national identity (their ‘Mexicanness’) in reaction to a hostile socio-political reception context in the US. It further shows how these migrants recreate their class identity and show tendencies to distance themselves from what they perceive as lower-class Mexican migrants and the dominant popular Mexican and Latin-American cultural expressions. In a final step, it examines how the lived experience of migration itself impacts the migrants’ identities, their concept of self and feelings/modes of being and belonging.

Keywords: ethno-national identity, middle class identity, middle-class migration, migrants’ identity, skilled migration

Procedia PDF Downloads 120
2790 Identification of Hepatocellular Carcinoma Using Supervised Learning Algorithms

Authors: Sagri Sharma

Abstract:

Analysis of diseases integrating multi-factors increases the complexity of the problem and therefore, development of frameworks for the analysis of diseases is an issue that is currently a topic of intense research. Due to the inter-dependence of the various parameters, the use of traditional methodologies has not been very effective. Consequently, newer methodologies are being sought to deal with the problem. Supervised Learning Algorithms are commonly used for performing the prediction on previously unseen data. These algorithms are commonly used for applications in fields ranging from image analysis to protein structure and function prediction and they get trained using a known dataset to come up with a predictor model that generates reasonable predictions for the response to new data. Gene expression profiles generated by DNA analysis experiments can be quite complex since these experiments can involve hypotheses involving entire genomes. The application of well-known machine learning algorithm - Support Vector Machine - to analyze the expression levels of thousands of genes simultaneously in a timely, automated and cost effective way is thus used. The objectives to undertake the presented work are development of a methodology to identify genes relevant to Hepatocellular Carcinoma (HCC) from gene expression dataset utilizing supervised learning algorithms and statistical evaluations along with development of a predictive framework that can perform classification tasks on new, unseen data.

Keywords: artificial intelligence, biomarker, gene expression datasets, hepatocellular carcinoma, machine learning, supervised learning algorithms, support vector machine

Procedia PDF Downloads 407
2789 A Unique Multi-Class Support Vector Machine Algorithm Using MapReduce

Authors: Aditi Viswanathan, Shree Ranjani, Aruna Govada

Abstract:

With data sizes constantly expanding, and with classical machine learning algorithms that analyze such data requiring larger and larger amounts of computation time and storage space, the need to distribute computation and memory requirements among several computers has become apparent. Although substantial work has been done in developing distributed binary SVM algorithms and multi-class SVM algorithms individually, the field of multi-class distributed SVMs remains largely unexplored. This research seeks to develop an algorithm that implements the Support Vector Machine over a multi-class data set and is efficient in a distributed environment. For this, we recursively choose the best binary split of a set of classes using a greedy technique. Much like the divide and conquer approach. Our algorithm has shown better computation time during the testing phase than the traditional sequential SVM methods (One vs. One, One vs. Rest) and out-performs them as the size of the data set grows. This approach also classifies the data with higher accuracy than the traditional multi-class algorithms.

Keywords: distributed algorithm, MapReduce, multi-class, support vector machine

Procedia PDF Downloads 373
2788 Insults, Injuries, and Resistance: Challenging Environmental Classism and Embracing Working-Class Environmentalism

Authors: Karen Bell

Abstract:

It is vital to integrate a working-class perspective into the just transition to an inclusive and sustainable society because of the particular expertise and interests that working-class people bring to the debates and actions. In class societies, those who are not well represented in the current structures of power can find it easier to see when the system is not working. They are also more likely to be impacted by the environmental crises because wealthier people can change their dwelling places, jobs and other aspects of their lives in the face of risks. Therefore, challenging the ‘post-material values thesis’, this paper argues that, if enabled to do so, working-class people are more likely to identify what needs to be addressed and changed in transition and can be more motivated to make the changes necessary than other social groups. However, they are often excluded from environmental decision-making and environmental social movements. The paper is based on a mixed methodology; drawing on secondary data, interview material, participant observation and documentary analysis. It is based on years of research and activism on environmental issues in working-class communities. The analysis and conclusion discusses the seven kinds of change required to address this problem: 1) organizational change - participatory practice (2) legislative change - make class an equalities and human rights issue (3) policy change - reduce inequality (4) social movement change - radicalize the environmental movement and support the environmental working-class (5) political change - create an eco-social state based on sharing (6) cultural change - integrate social and environmental justice, and (7) revolutionary change - dismantle capitalism.

Keywords: environmentalism, just transition, sustainability, working class

Procedia PDF Downloads 131
2787 An Analysis of Turn-Taking in ESL Classrooms

Authors: Nursuhaila Ibrahim, Noor Hanim Rahmat, Nurul Ain Hasni, Nursyuhada Zakaria

Abstract:

Past studies have shown that class discussions in the ESL classrooms not only helped students exchange ideas with their peers. Students also learn turn taking skills throughout the discussion. Through interacting with their peers, learners learn to use turn-taking strategies. They learn to wait for their turn, to listen to the ideas of others, to disagree, or to agree, and to add on more points in the conversation. This quantitative research explores students’ perception on class discussions and how the discussions influence their choice of turn-taking strategies. Findings of this research will have interesting implications towards the use of class discussions in the ESL classrooms.

Keywords: ESL, class discussions, turn-taking skills, peers

Procedia PDF Downloads 467
2786 A Study of a Diachronic Relationship between Two Weak Inflection Classes in Norwegian, with Emphasis on Unexpected Productivity

Authors: Emilija Tribocka

Abstract:

This contribution presents parts of an ongoing study of a diachronic relationship between two weak verb classes in Norwegian, the a-class (cf. the paradigm of ‘throw’: kasta – kastar – kasta – kasta) and the e-class (cf. the paradigm of ‘buy’: kjøpa – kjøper – kjøpte – kjøpt). The study investigates inflection class shifts between the two classes with Old Norse, the ancestor of Modern Norwegian, as a starting point. Examination of inflection in 38 verbs in four chosen dialect areas (106 places of attestations) demonstrates that the shifts from the a-class to the e-class are widespread to varying degrees in three out of four investigated areas and are more common than the shifts in the opposite direction. The diachronic productivity of the e-class is unexpected for several reasons. There is general agreement that type frequency is an important factor influencing productivity. The a-class (53% of all weak verbs) was more type frequent in Old Norse than the e-class (42% of all weak verbs). Thus, given the type frequency, the expansion of the e-class is unexpected. Furthermore, in the ‘core’ areas of expanded e-class inflection, the shifts disregard phonological principles creating forms with uncomfortable consonant clusters, e.g., fiskte instead of fiska, the preterit of fiska ‘fish’. Later on, these forms may be contracted, i.e., fiskte > fiste. In this contribution, two factors influencing the shifts are presented: phonological form and token frequency. Verbs with the stem ending in a consonant cluster, particularly when the cluster ends in -t, hardly ever shift to the e-class. As a matter of fact, verbs with this structure belonging to the e-class in Old Norse shift to the a-class in Modern Norwegian, e.g., ON e-class verb skipta ‘change’ shifts to the a-class. This shift occurs as a result of the lack of morpho-phonological transparency between the stem and the preterit suffix of the e-class, -te. As there is a phonological fusion between the stem ending in -t and the suffix beginning in -t, the transparent a-class inflection is chosen. Token frequency plays an important role in the shifts, too, in some dialects. In one of the investigated areas, the most token frequent verbs of the ON e-class remain in the e-class (e.g., høyra ‘hear’, leva ‘live’, kjøpa ‘buy’), while less frequent verbs may shift to the a-class. Furthermore, the results indicate that the shift from the a-class to the e-class occurs in some of the most token frequent verbs of the ON a-class in this area, e.g., lika ‘like’, lova ‘promise’, svara ‘answer’. The latter is unexpected as frequent items tend to remain stable. This study presents a case of unexpected productivity, demonstrating that minor patterns can grow and outdo major patterns. Thus, type frequency is not the only factor that determines productivity. The study addresses the role of phonological form and token frequency in the spread of inflection patterns.

Keywords: inflection class, productivity, token frequency, phonological form

Procedia PDF Downloads 37
2785 The Current Status of Middle Class Internet Use in China: An Analysis Based on the Chinese General Social Survey 2015 Data and Semi-Structured Investigation

Authors: Abigail Qian Zhou

Abstract:

In today's China, the well-educated middle class, with stable jobs and above-average income, are the driving force behind its Internet society. Through the analysis of data from the 2015 Chinese General Social Survey and 50 interviewees, this study investigates the current situation of this group’s specific internet usage. The findings of this study demonstrate that daily life among the members of this socioeconomic group is closely tied to the Internet. For Chinese middle class, the Internet is used to socialize and entertain self and others. It is also used to search for and share information as well as to build their identities. The empirical results of this study will provide a reference, supported by factual data, for enterprises seeking to target the Chinese middle class through online marketing efforts.

Keywords: middle class, Internet use, network behaviour, online marketing, China

Procedia PDF Downloads 93
2784 First Order Moment Bounds on DMRL and IMRL Classes of Life Distributions

Authors: Debasis Sengupta, Sudipta Das

Abstract:

The class of life distributions with decreasing mean residual life (DMRL) is well known in the field of reliability modeling. It contains the IFR class of distributions and is contained in the NBUE class of distributions. While upper and lower bounds of the reliability distribution function of aging classes such as IFR, IFRA, NBU, NBUE, and HNBUE have discussed in the literature for a long time, there is no analogous result available for the DMRL class. We obtain the upper and lower bounds for the reliability function of the DMRL class in terms of first order finite moment. The lower bound is obtained by showing that for any fixed time, the minimization of the reliability function over the class of all DMRL distributions with a fixed mean is equivalent to its minimization over a smaller class of distribution with a special form. Optimization over this restricted set can be made algebraically. Likewise, the maximization of the reliability function over the class of all DMRL distributions with a fixed mean turns out to be a parametric optimization problem over the class of DMRL distributions of a special form. The constructive proofs also establish that both the upper and lower bounds are sharp. Further, the DMRL upper bound coincides with the HNBUE upper bound and the lower bound coincides with the IFR lower bound. We also prove that a pair of sharp upper and lower bounds for the reliability function when the distribution is increasing mean residual life (IMRL) with a fixed mean. This result is proved in a similar way. These inequalities fill a long-standing void in the literature of the life distribution modeling.

Keywords: DMRL, IMRL, reliability bounds, hazard functions

Procedia PDF Downloads 377
2783 Risk Assessment of Heavy Rainfall and Development of Damage Prediction Function for Gyeonggi-Do Province

Authors: Jongsung Kim, Daegun Han, Myungjin Lee, Soojun Kim, Hung Soo Kim

Abstract:

Recently, the frequency and magnitude of natural disasters are gradually increasing due to climate change. Especially in Korea, large-scale damage caused by heavy rainfall frequently occurs due to rapid urbanization. Therefore, this study proposed a Heavy rain Damage Risk Index (HDRI) using PSR (Pressure – State - Response) structure for heavy rain risk assessment. We constructed pressure index, state index, and response index for the risk assessment of each local government in Gyeonggi-do province, and the evaluation indices were determined by principal component analysis. The indices were standardized using the Z-score method then HDRIs were obtained for 31 local governments in the province. The HDRI is categorized into three classes, say, the safest class is 1st class. As the results, the local governments of the 1st class were 15, 2nd class 7, and 3rd class 9. From the study, we were able to identify the risk class due to the heavy rainfall for each local government. It will be useful to develop the heavy rainfall prediction function by risk class, and this was performed in this issue. Also, this risk class could be used for the decision making for efficient disaster management. Acknowledgements: This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (2017R1A2B3005695).

Keywords: natural disaster, heavy rain risk assessment, HDRI, PSR

Procedia PDF Downloads 171
2782 Deep Feature Augmentation with Generative Adversarial Networks for Class Imbalance Learning in Medical Images

Authors: Rongbo Shen, Jianhua Yao, Kezhou Yan, Kuan Tian, Cheng Jiang, Ke Zhou

Abstract:

This study proposes a generative adversarial networks (GAN) framework to perform synthetic sampling in feature space, i.e., feature augmentation, to address the class imbalance problem in medical image analysis. A feature extraction network is first trained to convert images into feature space. Then the GAN framework incorporates adversarial learning to train a feature generator for the minority class through playing a minimax game with a discriminator. The feature generator then generates features for minority class from arbitrary latent distributions to balance the data between the majority class and the minority class. Additionally, a data cleaning technique, i.e., Tomek link, is employed to clean up undesirable conflicting features introduced from the feature augmentation and thus establish well-defined class clusters for the training. The experiment section evaluates the proposed method on two medical image analysis tasks, i.e., mass classification on mammogram and cancer metastasis classification on histopathological images. Experimental results suggest that the proposed method obtains superior or comparable performance over the state-of-the-art counterparts. Compared to all counterparts, our proposed method improves more than 1.5 percentage of accuracy.

Keywords: class imbalance, synthetic sampling, feature augmentation, generative adversarial networks, data cleaning

Procedia PDF Downloads 106
2781 Research of Data Cleaning Methods Based on Dependency Rules

Authors: Yang Bao, Shi Wei Deng, WangQun Lin

Abstract:

This paper introduces the concept and principle of data cleaning, analyzes the types and causes of dirty data, and proposes several key steps of typical cleaning process, puts forward a well scalability and versatility data cleaning framework, in view of data with attribute dependency relation, designs several of violation data discovery algorithms by formal formula, which can obtain inconsistent data to all target columns with condition attribute dependent no matter data is structured (SQL) or unstructured (NoSQL), and gives 6 data cleaning methods based on these algorithms.

Keywords: data cleaning, dependency rules, violation data discovery, data repair

Procedia PDF Downloads 537
2780 Profiling Risky Code Using Machine Learning

Authors: Zunaira Zaman, David Bohannon

Abstract:

This study explores the application of machine learning (ML) for detecting security vulnerabilities in source code. The research aims to assist organizations with large application portfolios and limited security testing capabilities in prioritizing security activities. ML-based approaches offer benefits such as increased confidence scores, false positives and negatives tuning, and automated feedback. The initial approach using natural language processing techniques to extract features achieved 86% accuracy during the training phase but suffered from overfitting and performed poorly on unseen datasets during testing. To address these issues, the study proposes using the abstract syntax tree (AST) for Java and C++ codebases to capture code semantics and structure and generate path-context representations for each function. The Code2Vec model architecture is used to learn distributed representations of source code snippets for training a machine-learning classifier for vulnerability prediction. The study evaluates the performance of the proposed methodology using two datasets and compares the results with existing approaches. The Devign dataset yielded 60% accuracy in predicting vulnerable code snippets and helped resist overfitting, while the Juliet Test Suite predicted specific vulnerabilities such as OS-Command Injection, Cryptographic, and Cross-Site Scripting vulnerabilities. The Code2Vec model achieved 75% accuracy and a 98% recall rate in predicting OS-Command Injection vulnerabilities. The study concludes that even partial AST representations of source code can be useful for vulnerability prediction. The approach has the potential for automated intelligent analysis of source code, including vulnerability prediction on unseen source code. State-of-the-art models using natural language processing techniques and CNN models with ensemble modelling techniques did not generalize well on unseen data and faced overfitting issues. However, predicting vulnerabilities in source code using machine learning poses challenges such as high dimensionality and complexity of source code, imbalanced datasets, and identifying specific types of vulnerabilities. Future work will address these challenges and expand the scope of the research.

Keywords: code embeddings, neural networks, natural language processing, OS command injection, software security, code properties

Procedia PDF Downloads 80
2779 Data Mining As A Tool For Knowledge Management: A Review

Authors: Maram Saleh

Abstract:

Knowledge has become an essential resource in today’s economy and become the most important asset of maintaining competition advantage in organizations. The importance of knowledge has made organizations to manage their knowledge assets and resources through all multiple knowledge management stages such as: Knowledge Creation, knowledge storage, knowledge sharing and knowledge use. Researches on data mining are continues growing over recent years on both business and educational fields. Data mining is one of the most important steps of the knowledge discovery in databases process aiming to extract implicit, unknown but useful knowledge and it is considered as significant subfield in knowledge management. Data miming have the great potential to help organizations to focus on extracting the most important information on their data warehouses. Data mining tools and techniques can predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions. This review paper explores the applications of data mining techniques in supporting knowledge management process as an effective knowledge discovery technique. In this paper, we identify the relationship between data mining and knowledge management, and then focus on introducing some application of date mining techniques in knowledge management for some real life domains.

Keywords: Data Mining, Knowledge management, Knowledge discovery, Knowledge creation.

Procedia PDF Downloads 182
2778 Generalization of Tau Approximant and Error Estimate of Integral Form of Tau Methods for Some Class of Ordinary Differential Equations

Authors: A. I. Ma’ali, R. B. Adeniyi, A. Y. Badeggi, U. Mohammed

Abstract:

An error estimation of the integrated formulation of the Lanczos tau method for some class of ordinary differential equations was reported. This paper is concern with the generalization of tau approximants and their corresponding error estimates for some class of ordinary differential equations (ODEs) characterized by m + s =3 (i.e for m =1, s=2; m=2, s=1; and m=3, s=0) where m and s are the order of differential equations and number of overdetermination, respectively. The general result obtained were validated with some numerical examples.

Keywords: approximant, error estimate, tau method, overdetermination

Procedia PDF Downloads 578
2777 Open educational Resources' Metadata: Towards the First Star to Quality of Open Educational Resources

Authors: Audrey Romero-Pelaez, Juan Carlos Morocho-Yunga

Abstract:

The increasing amount of open educational resources (OER) published on the web for consumption in teaching and learning environments also generates a growing need to ensure the quality of these resources. The low level of OER discovery is one of the most significant drawbacks when faced with its reuse, and as a consequence, high-quality educational resources can go unnoticed. Metadata enables the discovery of resources on the web. The purpose of this study is to lay the foundations for open educational resources to achieve their first quality star within the Quality4OER Framework. In this study, we evaluate the quality of OER metadata and establish the main guidelines on metadata quality in this context.

Keywords: open educational resources, OER quality, quality metadata

Procedia PDF Downloads 213
2776 Satire of Victorian Mores in Charles Dickens’ Great Expectations

Authors: Nagwa Abouserie Soliman

Abstract:

The Victorian era, which started with the reign of Queen Victoria from June 1837 to January 1901, could be considered as one of the most significant eras that had a crucial impact which formed contemporary British life despite the fact that with the rise of the British empire many negative aspects surfaced, namelysocial inequalities such as class differences, child labor, population increase and poverty due to the industrial revolution. Charles Dickens was one of the most prominent writers of the Victorian era who perceived the hypocrisy of the Victorian mores. The appropriate researchstyle that was chosen for this literary analysis is a qualitative research method in which the researcher used the conceptual approach to analyse theDickensian characterisation andwriting style through diction, narrative voice, and images. The aim of this paper is to argue that Charles Dickens inGreat Expectations (1861) was highly satirical of the Victorian mores, as he uses a lot of sharp irony-to satirize various Victorian traditions such as class divisions, the justice system, the poor working class, and the upper-class snobbery that he thought are inhumane and unjust.

Keywords: victorian, child labour, poverty, class division, snobbery

Procedia PDF Downloads 105
2775 The Effects of Multiple Levels of Intelligence in an Algebra 1 Classroom

Authors: Abigail Gragg

Abstract:

The goal of this research study was to adjudicate if implementing Howard Gardner’s multiple levels of intelligence would enhance student achievement levels in an Algebra 1 College Preparatory class. This was conducted within every class by incorporating one level of the eight levels of intelligence into small group work in stations. Every class was conducted utilizing small-group instruction. Achievement levels were measured through various forms of collected data that expressed student understandings in class through formative assessments versus student understandings on summative assessments. The data samples included: assessments (i.e. summative and formative assessments), observable data, video recordings, a daily log book, student surveys, and checklists kept during the observation periods. Formative assessments were analyzed during each class period to measure in-class understanding. Summative assessments were dissected per question per accuracy to review the effects of each intelligence implemented. The data was collated into a coding workbook for further analysis to conclude the resulting themes of the research. These themes include 1) there was no correlation to multiple levels of intelligence enhancing student achievement, 2) bodily-kinesthetic intelligence showed to be the intelligence that had the most improvement on test questions and 3) out of all of the bits of intelligence, interpersonal intelligence enhanced student understanding in class.

Keywords: stations, small group instruction, multiple levels of intelligence, Mathematics, Algebra 1, student achievement, secondary school, instructional Pedagogies

Procedia PDF Downloads 74
2774 Historical Geotechnical Study and Evaluation of Project Progress for the Tafila City Center Development Project

Authors: Mohmd Sarireh

Abstract:

The geotechnical study can be employed successfully to assess and follow the expected development or delay in the project construction. The development project of city center or downtown was taken as a case study for the investigation of the project conditions that might support progress or cause delay. The project was proposed to build 7447 m2 by reinforced concrete mainly to serve and support the services provided to people in Tafila. The project construction had faced challenges and obstacles such as soil collapse because of excavation of the weak soil that found in the project site. In addition, the topography of the project area showed a high slope from South-West to North. The slope through the project footprint reached to 83.3% which is considered very high slope. One year and a half proposed to finish the project construction since the 1st of March 2013 and it was planned to be finished by the 31th of August 2014, but the project needs more than one year and a half as extension according to the consultant engineer. The collecting of data was conducted through the interviews with the engineers and officials, and by analyzing the soil reports and samples taken during design and excavation. The major findings came out to weak and fractured soil and construction waste that were found at project site. Also, soil was considered very fine according to the plasticity index (PI) values, in addition to the high depths required for foundation that contribute to the collapse of soil and the increase of project cost. The current project aims to present how the unseen conditions can delay the project construction and increase the cost of the project that rises to JD8.305 Million.

Keywords: geotechnical, management, progress, risk, soil unseen conditions management

Procedia PDF Downloads 196
2773 Web-Based Cognitive Writing Instruction (WeCWI): A Theoretical-and-Pedagogical e-Framework for Language Development

Authors: Boon Yih Mah

Abstract:

Web-based Cognitive Writing Instruction (WeCWI)’s contribution towards language development can be divided into linguistic and non-linguistic perspectives. In linguistic perspective, WeCWI focuses on the literacy and language discoveries, while the cognitive and psychological discoveries are the hubs in non-linguistic perspective. In linguistic perspective, WeCWI draws attention to free reading and enterprises, which are supported by the language acquisition theories. Besides, the adoption of process genre approach as a hybrid guided writing approach fosters literacy development. Literacy and language developments are interconnected in the communication process; hence, WeCWI encourages meaningful discussion based on the interactionist theory that involves input, negotiation, output, and interactional feedback. Rooted in the e-learning interaction-based model, WeCWI promotes online discussion via synchronous and asynchronous communications, which allows interactions happened among the learners, instructor, and digital content. In non-linguistic perspective, WeCWI highlights on the contribution of reading, discussion, and writing towards cognitive development. Based on the inquiry models, learners’ critical thinking is fostered during information exploration process through interaction and questioning. Lastly, to lower writing anxiety, WeCWI develops the instructional tool with supportive features to facilitate the writing process. To bring a positive user experience to the learner, WeCWI aims to create the instructional tool with different interface designs based on two different types of perceptual learning style.

Keywords: WeCWI, literacy discovery, language discovery, cognitive discovery, psychological discovery

Procedia PDF Downloads 537
2772 Advances on the Understanding of Sequence Convergence Seen from the Perspective of Mathematical Working Spaces

Authors: Paula Verdugo-Hernandez, Patricio Cumsille

Abstract:

We analyze a first-class on the convergence of real number sequences, named hereafter sequences, to foster exploration and discovery of concepts through graphical representations before engaging students in proving. The main goal was to differentiate between sequences and continuous functions-of-a-real-variable and better understand concepts at an initial stage. We applied the analytic frame of mathematical working spaces, which we expect to contribute to extending to sequences since, as far as we know, it has only developed for other objects, and which is relevant to analyze how mathematical work is built systematically by connecting the epistemological and cognitive perspectives, and involving the semiotic, instrumental, and discursive dimensions.

Keywords: convergence, graphical representations, mathematical working spaces, paradigms of real analysis, real number sequences

Procedia PDF Downloads 121
2771 Identity Crisis and Class Difference in Charles Dickens' 'Great Expectations'

Authors: Ramin Barati, Atefeh Salemi

Abstract:

In Victorian era, the society had been surrounded by extreme class ranking in order to identify the people of the classes and to intensify power relationships due to the growth of industry in Charles Dickens's (1812-1870) Great Expectations (2003) in which he illustrates the clash and dichotomy in the 19th century London. The classes in Victorian period have socially divided the population into two parts, the lower and the upper class of the community. In such a panopticon society, the major character Pip was the best example of the working class who was under the domination of violence, malice, and abuse of Miss Havisham as a member of the ruling class in order to take revenge on her failures. The conflict and disunity represented in vindictiveness and the sense of revenge applied by Miss Havisham against his victim Pip, made him experience alienation and eventually suffer from identity crisis. This paper considers New Historicism based on the theories of the French critic Michel Foucault (1926-1984). The social concept, panopticism, was called after the panopticon society, basically elaborated by Foucault in his book Discipline and Punish (1975) and he considers the panopticon as a sign of punitive community of surveillance. This paper evaluates the problems of a dual society to show that the people of the lower class are under the domination of capitalist society.

Keywords: class, identity crisis, violence, panoptic society, domination

Procedia PDF Downloads 194
2770 Capacitive Coupling Wireless Power Transfer System with 6.78 MHz Class D Inverter

Authors: Kang Hyun Yi

Abstract:

Wireless power transfer technologies are inductive coupling, magnetic resonance, and capacitive coupling methods, typically. Among them, the capacitive coupling wireless power transfer, also named Capacitive Coupling Wireless Power Transfer (CCWPT), has been researched to overcome the drawbacks of other approaches. The CCWPT has many advantages such as a simple structure, low standing power loss, reduced Electromagnetic Interference (EMI) and the ability to transfer power through metal barriers. In this paper, the CCWPT system with 6.78MHz class D inverter is proposed and analyzed. The proposed system is consisted of the 6.78MHz class D inverter with the LC low pass filter, the capacitor between a transmitter and a receiver and impedance transformers. The system is verified with a prototype for charging mobile devices.

Keywords: wireless power transfer, capacitive coupling power transfer, class D inverter, 6.78MHz

Procedia PDF Downloads 625
2769 Description of Geotechnical Properties of Jabal Omar

Authors: Ibrahim Abdel Gadir Malik, Dafalla Siddig Dafalla, Osama Abdelgadir El-Bushra

Abstract:

Geological and engineering characteristics of intact rock and the discontinuity surfaces was used to describe and classify rock mass into zones based on mechanical and physical properties. Many conditions terms that affect the rock mas; such as Rock strength, Rock Quality Designation (RQD) value, joint spacing, and condition of joint, water condition with block size, joint roughness, separation, joint hardness, friction angle and weathering were used to classify the rock mass into: Good quality (class II) (RMR values range between 75% and 56%), Good to fair quality (class II to III) (RMR values range between 70% and 55%), Fair quality (class III) (RMR values range between 60% and 50%) and Fair to poor quality (Class III to IV) (RMR values, range between (50% and 35%).

Keywords: rock strength, RQD, joints, weathering

Procedia PDF Downloads 391
2768 Screening for Hit Identification against Mycobacterium abscessus

Authors: Jichan Jang

Abstract:

Mycobacterium abscessus is a rapidly growing life-threatening mycobacterium with multiple drug-resistance mechanisms. In this study, we screened the library to identify active molecules targeting Mycobacterium abscessus using resazurin live/dead assays. In this screening assay, the Z-factor was 0.7, as an indication of the statistical confidence of the assay. A cut-off of 80% growth inhibition in the screening resulted in the identification of four different compounds at a single concentration (20 μM). Dose-response curves identified three different hit candidates, which generated good inhibitory curves. All hit candidates were expected to have different molecular targets. Thus, we found that compound X, identified, may be a promising candidate in the M. abscessus drug discovery pipeline.

Keywords: Mycobacterium abscessus, antibiotics, drug discovery, emerging Pathogen

Procedia PDF Downloads 181
2767 Creating a Multilevel ESL Learning Community for Adults

Authors: Gloria Chen

Abstract:

When offering conventional level-appropriate ESL classes for adults is not feasible, a multilevel adult ESL class can be formed to benefit those who need to learn English for daily function. This paper examines the rationale, the process, the contents, and the outcomes of a multilevel ESL class for adults. The action research discusses a variety of assessments, lesson plans, teaching strategies that facilitate lifelong language learning. In small towns where adult ESL learners are only a handful, often advanced students and inexperienced students have to be placed in one class. Such class might not be viewed as desirable, but with on-going assessments, careful lesson plans, and purposeful strategies, a multilevel ESL class for adults can overcome the obstacles and help learners to reach a higher level of English proficiency. This research explores some hand-on strategies, such as group rotating, cooperative learning, and modifying textbook contents for practical purpose, and evaluate their effectiveness. The data collected in this research include Needs Assessment (beginning of class term), Mid-term Self-Assessment (5 months into class term), End-of-term Student Reflection (10 months into class), and End-of-term Assessment from the Instructor (10 months into class). A descriptive analysis of the data explains the practice of this particular learning community, and reveal the areas for improvement and enrichment. This research answers the following questions: (1) How do the assessments positively help both learners and instructors? (2) How do the learning strategies prepare students to become independent, life-long English learners? (3) How do materials, grouping, and class schedule enhance the learning? The result of the research contributes to the field of teaching and learning in language, not limited in English, by (a) examining strategies of conducting a multilevel adult class, (b) involving adult language learners with various backgrounds and learning styles for reflection and feedback, and (c) improving teaching and learning strategies upon research methods and results. One unique feature of this research is how students can work together with the instructor to form a learning community, seeking and exploring resources available to them, to become lifelong language learners.

Keywords: adult language learning, assessment, multilevel, teaching strategies

Procedia PDF Downloads 329
2766 Virtual Screening and in Silico Toxicity Property Prediction of Compounds against Mycobacterium tuberculosis Lipoate Protein Ligase B (LipB)

Authors: Junie B. Billones, Maria Constancia O. Carrillo, Voltaire G. Organo, Stephani Joy Y. Macalino, Inno A. Emnacen, Jamie Bernadette A. Sy

Abstract:

The drug discovery and development process is generally known to be a very lengthy and labor-intensive process. Therefore, in order to be able to deliver prompt and effective responses to cure certain diseases, there is an urgent need to reduce the time and resources needed to design, develop, and optimize potential drugs. Computer-aided drug design (CADD) is able to alleviate this issue by applying computational power in order to streamline the whole drug discovery process, starting from target identification to lead optimization. This drug design approach can be predominantly applied to diseases that cause major public health concerns, such as tuberculosis. Hitherto, there has been no concrete cure for this disease, especially with the continuing emergence of drug resistant strains. In this study, CADD is employed for tuberculosis by first identifying a key enzyme in the mycobacterium’s metabolic pathway that would make a good drug target. One such potential target is the lipoate protein ligase B enzyme (LipB), which is a key enzyme in the M. tuberculosis metabolic pathway involved in the biosynthesis of the lipoic acid cofactor. Its expression is considerably up-regulated in patients with multi-drug resistant tuberculosis (MDR-TB) and it has no known back-up mechanism that can take over its function when inhibited, making it an extremely attractive target. Using cutting-edge computational methods, compounds from AnalytiCon Discovery Natural Derivatives database were screened and docked against the LipB enzyme in order to rank them based on their binding affinities. Compounds which have better binding affinities than LipB’s known inhibitor, decanoic acid, were subjected to in silico toxicity evaluation using the ADMET and TOPKAT protocols. Out of the 31,692 compounds in the database, 112 of these showed better binding energies than decanoic acid. Furthermore, 12 out of the 112 compounds showed highly promising ADMET and TOPKAT properties. Future studies involving in vitro or in vivo bioassays may be done to further confirm the therapeutic efficacy of these 12 compounds, which eventually may then lead to a novel class of anti-tuberculosis drugs.

Keywords: pharmacophore, molecular docking, lipoate protein ligase B (LipB), ADMET, TOPKAT

Procedia PDF Downloads 399
2765 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management

Authors: M. Moslehpour, S. Khorsandi

Abstract:

As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.

Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management

Procedia PDF Downloads 165